Wonga example Register Question- What risks do you think businesses face due to IT developments?

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
POSSIBLE THREATS TO DATA
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Crime and Security in the Networked Economy Part 4.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Security, Privacy, and Ethics Online Computer Crimes.
Cyber X-Force-SMS alert system for threats.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Unit 4 – Impact of the use of IT on Business Systems.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 11 Security and Privacy: Computers and the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crimes.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
CYBER CRIME.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Cybercrime What is it, what does it cost, & how is it regulated?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Unit 4: Impact of the Use of IT on Business Systems
Misuses of ICT Malpractice and crime © Folens 2008.
GCSE ICT SECURITY THREATS.
IT Security  .
Unit 4 IT Security.
Part 3.
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
Presentation transcript:

Wonga example Register Question- What risks do you think businesses face due to IT developments?

CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers can break into bank accounts and steal money and move it to other accounts. Unlawful purchases can be made from undesirable sites and unscrupulous organisations can offer illegal wares to the general public and adult products to under age consumers. Diverting financial assets – criminals are able to transfer sums of money across the Internet easily and quickly. Sabotage of communications – Virus’s through attachments. Bugs are likely to occur where software is introduced prematurely onto the market without sufficient testing. Wireless telecommunications area also subject to sabotage – mobile networks. Anti Virus – software to protect your system – firewalls – blocking device

INTELLECTUAL PROPERTY THEFT Two main types of business: those that provide a service and those that make and /or sell products. Exclusive rights to a product – patent – cannot be copied – copyright. When a person or organisation copies or uses patented or copyright material without the owners permission this is called stealing intellectual property. This is a major problem with copyright material that is made available on the internet. Many people copy and paste information from the internet and pass it off as their own. This is an illegal activity and is known as plagiarism.

DENIAL OF SERVICE ATTACKS Interruption to the operation of a network. Denial of service can happen when a site is bombarded with requests from a page and the site jams. Preventative technologies – these can aid the management of risks. They include systems that monitor compliance with data protection and firewall software that can prevent access to certain undesirable websites. Firewalls – hardware or software that limits access to and between networks. Firewalls use filters to block unauthorised material and potentially dangerous attacks such as viruses from entering the system Controlled access – password required to log in. Secure areas in a network requires password access and wireless networks need a secure enabled to limit unauthorised access.

Phishing – criminals send out fraudulent s that claim to be from a legitimate company with the aim of obtaining the recipients personal details and committing identify theft. Secure payment systems – PayPal offer the VeriSign Identity Protection Network (VIP). Padlock for secure sites. Disaster recovery – organisations and individuals should have a plan for ensuring that information stored electronically is not only secure, but also backed up. Organisations should have a formal disaster recovery plan setting out clearly what they should do in the event of a range of disastrous scenarios. Specialist accounting software often have a simple process for restoring accounts if they become accidently over written or corrupt. Data protection act does not only apply to file servers but also PDA’s Risks become threats only when organisations choose not to move with the times.

4.1 ASSIGNMENT – DEADLINE IS 23 RD SEPTEMBER TIPS : Describe 2 or 3 hardware and software developments for P5 and include images. Research cost and ease of use, look at PC reviews for inspiration and layout ideas. Include key words such as capacity, sophistication, integrated, communication etc Reference your sources of information. Keep referring back to the unit specification and lesson PowerPoints, resources on the Padlet wall. Spellcheck your work regularly. Plan your time – 2 pass criteria, 4 lessons plus study day and ‘free’ lessons. P5Describe recent IT developments P4 Explain how an organisation can manage risk when using IT technology